Article Preview
TopTrusted Systems
Regarding the basic architecture and functioning of Digital Rights Management systems, various so-called “Rights Expression Languages” have been proposed, for the management of digital rights for media content distribution. These languages and frameworks are essentially the result of efforts of businesses to protect digital material from reproduction and sharing. However all Rights Expression Languages just allow copyright holders to express restrictions about the usage of a resource (for this reason, critics of those technologies often refer to them as “restrictions expression languages”), without being able to enforce by themselves the policies they convey. The usage of “trustworthy” systems (Coyle, 2003) and the application of international laws is necessary for actually enforcing the policies these languages allow to express.
In fact, obfuscation is the Achille’s heel of most DRM systems (Stamp, 2003). Obfuscation is necessary for the realization of DRM restrictions on common PCs and other open systems, to make reverse engineering more difficult and protect in some way the decryption function. But in traditional cryptography, obfuscation has always been considered a poor solution, with uncertain resistance to attacks. Moreover, in open systems the decryption function (generally a cryptographic key) can be gathered by scanning the system memory at runtime.
To overcome this problem, content producers are encouraging laws against circumvention of DRM policies. But another parallel effort is directed toward the realization of so-called Trusted Computing systems, composed only of approved hardware and software components, which can assure the respect of media access restrictions.